Self Hosted Threat Hunting: Build Your Own Security Lab with Security Onion

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 พ.ย. 2024

ความคิดเห็น • 29

  • @borisvokladski5844
    @borisvokladski5844 8 วันที่ผ่านมา +24

    After using Security Onion (standalone architecture) for approx 1 year in my home network with 1gbit/s Internet, here is my takeaway notes:
    - 32GB RAM is way better than 16GB
    - If possible, the monitor network card should be at least 2.5 gbit/s, if all the devices on the network using 1 gbit/s interfaces.
    - I use port mirroring on my MikroTik CRS326-24G-2S+ switch to send all the network packages to the monitor interface
    - Intel NICs are better for the monitor interface than e.g. Realtek NICs

    • @mantisthefirst
      @mantisthefirst 8 วันที่ผ่านมา

      Same here ;) agree 100%

  • @steventorres4167
    @steventorres4167 6 วันที่ผ่านมา +3

    Great video! This is a great foundational video for anyone looking to get more involved in InfoSec. Awesome showing!

  • @dwlaker3
    @dwlaker3 8 วันที่ผ่านมา +8

    I used this as part of my capstone project for my bachelor's. It was really nice to have visual representations for all the traffic and alerting for threatening/malicious behavior on the network. Really great to see you demoing this as well.

  • @xgeko2
    @xgeko2 8 วันที่ผ่านมา +1

    Man I’ve been a huge fan and long time user of security onion. It’s such a damn good tool. And it has enterprise support and Doug offers training.

    • @xgeko2
      @xgeko2 8 วันที่ผ่านมา +1

      Also you may want to mention the most important server consideration is disk space. CPU and ram you can get by with easily but you can very quickly fill your disk especially if your doing full packet captures by default. My first SO server I tested with had a 4tb disk which I filled in less than a day….

  • @-someone-.
    @-someone-. 8 วันที่ผ่านมา +1

    Wow. Thank you so much. There’s absolutely nothing on yt if you search for network monitoring, maybe a few nems vids and how to set up elastic search, but nothing as comprehensive as this!
    👊

  • @chaosfenix
    @chaosfenix 8 วันที่ผ่านมา +2

    So I think it would be interesting to to go over open source security architectures from multiple levels. So level one could be like an individual using something like clamAV. Level 2 could be an intrepid home labber or small business and what tools they could use. Level 3 could be more a medium business with dedicated IT and level 4 could be the full stack. Like what tools would you use in each level and why. The thing is that security is hard and what you use depends a lot on skill level as well as time you are willing to dedicate to it. There are a lot of security tools out there. Off the top of my head I can think of OPNSense, Security Onion, Wazuh, ClamAV, OSSEC, and OSSIM. Another added layer of complexity here is that because they are open source many of these tools use the same components. I think Suricata and Snort are used in multiple of these options here. Are they equivalent or even if OPNSense and security onion both use suricata do they use them in different ways where you can still get benefits out of using both?

  • @thedevtoss
    @thedevtoss 2 วันที่ผ่านมา

    Great foundation for everyone starting out!

  • @ArronJab
    @ArronJab 8 วันที่ผ่านมา +1

    Love the Security Onion content. Please give us more! Maybe some BPF tuning tips for multiple VLANs.

  • @PowerUsr1
    @PowerUsr1 8 วันที่ผ่านมา +5

    This one is a banger. Thanks Tom

  • @KeyserTheRedBeard
    @KeyserTheRedBeard 7 วันที่ผ่านมา +1

    Impressive content, Lawrence Systems. Looking forward to seeing your next upload from you. I smashed the thumbs up button on your video. Keep up the fantastic work! Your breakdown of Security Onion’s installation process was very thorough. How do you see the evolution of threat detection tools like Security Onion impacting the future of network security strategies?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  7 วันที่ผ่านมา

      Thanks, and Security Onion is a great tool for people into security.

  • @beef7631
    @beef7631 8 วันที่ผ่านมา +2

    Would be good if you could do more if possible - anyway well done!

  • @jasonperry6046
    @jasonperry6046 8 วันที่ผ่านมา +5

    So glad you did this video.
    I am going to go check out that video you mentioned in the video.
    I agree I don't think the TH-cam algorithm has been fair to Security Onion. I can find 10 Wazuh videos to 1 Security Onion.
    Thanks for making this video.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  8 วันที่ผ่านมา +4

      Glad you found it helpful!

  • @Rohambili
    @Rohambili 8 วันที่ผ่านมา

    Hey Tom!
    What you suggest to use to detect network attacks when you using cloudlfared tunnel...? Is there something which can show the attackers real IP in this situation? Do i even need to care about this or cloudflare block anything, and i can just forget to monitor?
    Im running a potatoe AMD E-350 (2) @ 1.60 GHz 3.76 GiB / 7.38 GiB (51%) Alpine linux with a known good ipv4+6 iptables ruleset.... running docker grav, immich littlelink, nextcloud, searxng, transmission, wordpress, watchtower, uptime kuma...Prometheus + Grafana + cAdvisor ?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  8 วันที่ผ่านมา

      Because the attacks would be happening on the cloudflare side that is where the data would need to come from.

  • @peterkovacs233
    @peterkovacs233 8 วันที่ผ่านมา +4

    This one or Wazuh? :)

    • @Zaim-S
      @Zaim-S 8 วันที่ผ่านมา +2

      Also more fan of wazuh

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  8 วันที่ผ่านมา +8

      I am debating about doing a video on that as well, most of the popular videos on Wazuh are also sponsored by them.

    • @terryjohnson3100
      @terryjohnson3100 8 วันที่ผ่านมา

      We are using wuzah at work and was thinking about putting it on my home network. I think I'll switch it to SO to learn a different platform.

    • @security-onion
      @security-onion 8 วันที่ผ่านมา +3

      It really depends on your use case. Previous versions of Security Onion actually included Wazuh but we've replaced it with the Elastic Agent as it's more integrated into our platform and is more suited for our use case of threat hunting and incident response.

    • @133col
      @133col 8 วันที่ผ่านมา

      @@LAWRENCESYSTEMS That would be great. I am a newbie looking into this topic and found wazuh, but now this one as well.